1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesantik [10]
3 years ago
10

Match the following:

Computers and Technology
1 answer:
Bogdan [553]3 years ago
3 0

Answer:

  1. Operating System.
  2. Laptop.
  3. Convertible computer.
  4. Peripheral.
  5. Desktop Computer.

Explanation:

Operating system is a software that manages the hardware and the software in the system and provides the interface between machine and the user.

Laptops are the portable computing devices which you can carry with you.

Convertible computer have a keyboard that is detachable and can be converted into a tablet.

Peripherals are devices which we can attach to the computer.

Desktop computer is a computing device that not portable at all.

You might be interested in
What is the proper way to name the range of cells located in colum A row 3 through colum C row 7?
LenKa [72]

Answer:

it is C

Explanation:

6 0
3 years ago
Read 2 more answers
What helps to identify trends?
vagabundo [1.1K]
Pie graph but idk if thats the answer
4 0
3 years ago
Read 2 more answers
The UML models operations by listing the operation name preceded by an access modifier. A(n) ________ indicates a public operati
Nastasia [14]

Answer / Explanation

The question seem not to be complete. It can be found in search engines.

Kindly find the complete question below.

Question

The UML models operations by listing the operation name followed by a set of ____. A plus sign (+) in front of the operation name indicates that the operation is a public one in the UML (i.e., a public method in Java).

Answer:

To properly answer this question, let us first define what a UML is:

UML can be defined as or is simply refereed to as Unified Modelling Language. It is considered as the standard for modeling language that enables designers and developers to specify, visualize, construct and document object or programs made by them in the areas of software systems, Thus, UML makes this objects developed by computer gurus secure and robust in execution.

If we now go back to the question asked while referencing the explanation given of what a UML is, the answer to the question is

parentheses.

However, if the original question being asked is valid, the answer to it would be : sign (+) in front of the operation name

5 0
3 years ago
Read 2 more answers
Hello.
gayaneshka [121]

Answer:

hellllllllllllooooooooooooooooo mah dude can i get brainliest

Explanation:

5 0
3 years ago
Read 2 more answers
One of the most important approaches used to secure personal data is ________________, which is the process used to prove the id
Mashutka [201]

Answer:

One of the most important approaches used to secure personal data is Authentication, which is the process used to prove the identity of an individual. Access Contol, however, is the process used to enable a person’s access privileges.

8 0
3 years ago
Other questions:
  • true or false? to change document properties, first tap or click file on the ribbon to open the properties view.
    6·2 answers
  • An example of live footage is when?
    10·2 answers
  • Identify the four basic categories of hardware in a microcomputer system. system unit, modem, ram, and microprocessor system uni
    5·1 answer
  • Information flows:
    11·1 answer
  • What is one reason why a business may want to move entirely online?
    13·1 answer
  • Which finger presses the Shift key on the keyboard?
    6·2 answers
  • The way a student prepares for a test or reviews academic material is referred to as
    8·2 answers
  • Please help i only have 20 minuets
    5·1 answer
  • 2
    6·1 answer
  • Question 2 of 10
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!